World News – US – Attack from DOS: In Zero We Trust


Recent global challenges have seen many organizations maintain their survival by going digital and adopting a mix of on-site, home-based and third-party collaborations

Internet and streaming media usage is on the rise – and a rapid transition to distributed work, coupled with sweeping changes in human behavior, is creating new and extensive digital risk for organizations while creating opportunities for malicious actors

A recent report from the Cybercrime Center at the University of Cambridge shows a threefold increase in distributed denial of service (DDoS) attacks, now registering around 30,000 attacks per day Interestingly, this change is due to new malicious attackers who are causing the increase as opposed to existing cybercriminals

As a result, many organizations now realize that DDoS defense is essential to maintain operations and ensure a pleasant customer experience. Nothing really affects a customer’s experience than a DDOS attack

DDoS attacks are a popular method of cyberattack, largely due to their simplicity, low cost, and anonymity

A DDoS attack is when multiple compromised systems attack a single target, causing that system to slow down, crash, or shut down The effect is to deny its users the ability to use it This is achieved by simply overwhelming the system with a flow of traffic from multiple sources

As the world saw during the pandemic, threat actors never fail to use a good crisis, with DDoS attacks multiplying on infrastructure providers like the massive 2 3TB per second attack on Amazon Web Services – biggest attack yet

There is no doubt that the growing number of insecure Internet of Things (IoT) devices that are infected and recruited into botnets are a major contributor

DDoS attacks come in various forms and the main categories are protocol attacks, volume-based attacks and application attacks Some common attacks include:

In addition to the newer methods that include SSL attacks, secondary channel attacks, and proxy server attacks, DDoS attacks are also increasingly used in mixed attacks. For example, in combination with malware, DDoS attacks against banks have been used to distract banks so that the transfer of stolen funds goes unnoticed.

Starting with some important considerations such as implementing patches and updates to avoid exploitable vulnerabilities, as well as training and awareness to help identify attacks at an early stage, companies should look for over-provisioning bandwidth to enable them to cope with sudden spikes and spikes in traffic Note that even in the event of significant overprovisioning, faced with a DDoS attack, companies only save time

At the technical level, some steps that can be taken to manage the attack may include:

Once again, businesses will save time as DDoS attacks increase in scale

Finally, contact an ISP or hosting provider who can help « hole out » this traffic, preventing it from reaching the infrastructure, or enlist the services of a DDoS mitigation specialist.

With the threat of such cyber attacks imminent, a change of mind is due, and this is done through the concept of « Zero-Trust »

The company has long embraced the concept of trust systems, and this trust in our systems is where the vulnerability and the opportunity to exploit reside.The Zero Trust approach gives us this very important rule to establish and maintain a safe working environment:

« Trust nothing and treat everything as hostile – this includes the network itself, any host, any applications or services running on the network »

The Zero Trust approach to cybersecurity puts an end to the old ‘castle and moat’ mentality; a long-standing methodology where organizations have focused on defending their perimeters while assuming that everything inside is « trustworthy » and therefore automatically allowed access. We trust way too much

The Zero Trust approach relies on a range of existing technologies as well as the right governance processes to achieve its mission of securing the organization’s IT environment, including:

Additionally, organizations should take advantage of internal micro-segmentation and apply granular perimeter based on user, location, and other data gathered to determine whether to trust a user, to a device or application seeking to access the company It then requires the application of the conditional policy, ie a policy specifying that a person can now have access to something

Today, about the only thing an organization really owns, or more specifically is responsible for, is data. The zero trust approach of « continuous verification » encompasses tighter controls around data, reducing the risk of unauthorized access, manipulation and movement of data, including malware This means that companies can focus their efforts on inspecting data and applying appropriate access control methodologies

Zero Trust is not just about technology; it’s about process and mindset, more so about a philosophy Many organizations are already using many elements of Zero Trust It’s also about using these and other technologies to enforce this very important rule: don’t do trust nothing, and nothing has access to it until it has been verified

The key point is that Zero Trust is about eliminating trust, and by eliminating trust organizations seek to eliminate failure of trust as well as attacks such as DDoS

For more on the topic of “The Rise of Zero Trust in the Digital Era”, join RSA CTO Dr. Zulfikar Ramzan, who will present his observations and recommendations in an upcoming webinar on November 5, 2020

DDoS Mitigation, Arbor Networks, F5, Denial of Service Attack, Akamai Technologies, Radware, Computer Security, Cyberattack, Cloudbric, Cloud computing

World news – US – Attack from DOS : In Zero We Trust


Donnez votre avis et abonnez-vous pour plus d’infos

Vidéo du jour: